Feeds

Sony wins subpoenas revealing visitors to PS3 jailbreaker site

Geohot's followers unmasked

5 things you didn’t know about cloud backup

A federal magistrate has awarded Sony a subpoena allowing the company to obtain the IP addresses of everyone who visited the personal website of PlayStation 3 jailbreaker George Hotz for the past 26 months.

Magistrate Judge Joseph C. Spero of San Francisco also granted Sony's request for subpoenas on Google, Twitter, and another service for information relating to accounts held by the 21-year-old Hotz, who goes by the moniker GeoHot. Thursday's move comes in a lawsuit Sony filed in January alleging that Hotz and more than 100 other other hackers violated US copyright law by showing others how to bypass technical measures built in to the game console so they would run games and software not authorized by Sony.

Together, the subpoenas allow Sony to obtain a wealth of information about people who aren't named in the complaint and have been accused of no wrongdoing. That includes the IP address of everyone who has visited www.geohot.com since January 2009 and the account names of anyone who has accessed a private video relating to the jailbreak on Hotz's YouTube account. Other subpoenas give Sony access to Tweets posted or published by Hotz, and information about his account on the PSX-Scene website.

In court documents, Sony rejected arguments submitted by the Electronic Frontier Foundation that the requests were “overly broad” and violated Hotz's Free Speech rights. Sony said it needed the information to learn the “identity of those who have downloaded the circumvention devices from Mr. Hotz’s website" and to assess “how rampant the access to and use of these circumvention devices has been in California in order to rebut Mr. Hotz’s suggestion that his illicit conduct was not aimed at the forum state.”

Sony attorneys also said they intended to “discover information regarding all persons who currently have access to a 'private video' uploaded by Mr. Hotz demonstrating his use of the circumvention devices on the PS3 System, and those who posted comments in response to the video.” Hotz posted the video on January 7 and later designated it as private, so it could be viewed only by select people.

The Sony document said that Hotz has already agreed not to oppose the subpoenas in exchange for Sony narrowing the scope of some of them.

The subpoenas were reported earlier by Wired.com, which has more here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.